A study on social engineering attacks: Phishing attack AF Al-Otaibi, ES Alsuwat International Journal of Recent Advances in Multidisciplinary Research 7 (11 …, 2020 | 26 | 2020 |
Modern study on internet of medical things (IOMT) security GS Aljumaie, GH Alzeer, RK Alghamdi, H Alsuwat, E Alsuwat International journal of computer science and network security: IJCSNS 21 (8 …, 2021 | 16 | 2021 |
Adversarial data poisoning attacks against the PC learning algorithm E Alsuwat, H Alsuwat, M Valtorta, C Farkas International Journal of General Systems 49 (1), 3-31, 2020 | 16 | 2020 |
Face image encryption based on feature with optimization using secure crypto general adversarial neural network and optical chaotic map M Alsafyani, F Alhomayani, H Alsuwat, E Alsuwat Sensors 23 (3), 1415, 2023 | 14 | 2023 |
How to Generate the Network you Want with the PC Learning Algorithm E Alsuwat, M Valtorta, C Farkas Proceedings of the 11th Workshop on Uncertainty Processing 11, 1-12, 2018 | 7 | 2018 |
Detecting adversarial attacks in the context of bayesian networks E Alsuwat, H Alsuwat, J Rose, M Valtorta, C Farkas Data and Applications Security and Privacy XXXIII: 33rd Annual IFIP WG 11.3 …, 2019 | 6 | 2019 |
Bayesian structure learning attacks E Alsuwat, M Valtorta, C Farkas University of South Carolina, 2018 | 5 | 2018 |
Simultaneous Tracking and Recognizing Drone Targets with Millimeter-Wave Radar and Convolutional Neural Network S Solaiman, E Alsuwat, R Alharthi Applied System Innovation 6 (4), 68, 2023 | 4 | 2023 |
Concept drift analysis and malware attack detection system using secure adaptive windowing. E Alsuwat, S Solaiman, H Alsuwat Computers, Materials & Continua 75 (2), 2023 | 4 | 2023 |
Detecting covid-19 utilizing probabilistic graphical models E Alsuwat, S Alzahrani, H Alsuwat International Journal of Advanced Computer Science and Applications (IJACSA …, 2021 | 4 | 2021 |
Security of web applications: Threats, vulnerabilities, and protection methods A Mohammed, J Alkhathami, H Alsuwat, E Alsuwat International journal of computer science and network security: IJCSNS 21 (8 …, 2021 | 4 | 2021 |
Cyber attacks against the pc learning algorithm E Alsuwat, A Hatim, V Marco, C Farkas 2nd International Workshop on A.I. in Security, http://iwaise2018.it …, 2018 | 4 | 2018 |
Modeling Concept Drift in the Context of Discrete Bayesian Networks. H Alsuwat, E Alsuwat, M Valtorta, JR Rose, C Farkas KDIR, 214-224, 2019 | 3 | 2019 |
Human Factor & Artificial Intelligence: For future software security to be invincible, a confronting comprehensive survey BO Al-Amri, H Alsuwat, E Alsuwat International journal of computer science and network security: IJCSNS 21 (6 …, 2021 | 2 | 2021 |
Privacy-preserving in the context of data mining and deep learning A Altalhi, M AL-Saedi, H Alsuwat, E Alsuwat International journal of computer science and network security: IJCSNS 21 (6 …, 2021 | 2 | 2021 |
Data dependencies preserving shuffle in relational database H Alsuwat, E Alsuwat, T Geng, CT Huang, C Farkas 2019 2nd International Conference on Data Intelligence and Security (ICDIS …, 2019 | 2 | 2019 |
Data poisoning attacks detection based on the convergence of the Peter and Clark algorithm and Bayesian adversarial federated learning E Alsuwat Journal of Electronic Imaging 32 (1), 013048-013048, 2023 | 1 | 2023 |
ECML PKDD 2018 Workshops C Alzate, A Monreale Springer International Publishing, 2019 | 1 | 2019 |
Evaluating the Efficacy of Latent Variables in Mitigating Data Poisoning Attacks in the Context of Bayesian Networks: An Empirical Study. S Alzahrani, H Alsuwat, E Alsuwat CMES-Computer Modeling in Engineering & Sciences 139 (2), 2024 | | 2024 |
SecK2–A novel machine learning algorithm for detecting data poisoning attacks E Alsuwat Journal of Intelligent & Fuzzy Systems, 1-15, 2023 | | 2023 |